(i) Explain Graphical User Interface (GUI): refers to the interaction between end users
and the computer based upon a graphical display. These are tools which are designed to enhance
persona] computing work. They are mostly fitted on work stations or personal computers with
graphical adaptors able to support high resolution graphics.
(ii) Reasons why GUI is easier to use than command line interface
- Graphical symbols are more easily recognized and memorized than text.
- Direct manipulation, for example by pointing and clicking on graphical objects with a
mouse, reduces learning time for users and gives them a greater feeling of control over
the HCI.
- Make computer operations more intuitive and thus easier to use and learn.
- Provide users with immediate, visual feedback about the effect of each action.
Kavungya answered the question on May 14, 2019 at 09:07
-
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse...
(Solved)
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
Date posted:
May 14, 2019
.
Answers (1)
-
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted:
May 14, 2019
.
Answers (1)
-
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted:
May 14, 2019
.
Answers (1)
-
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted:
May 14, 2019
.
Answers (1)
-
Briefly discuss four advantages of the virtual private network.
(Solved)
Briefly discuss four advantages of the virtual private network.
Date posted:
May 14, 2019
.
Answers (1)
-
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
(Solved)
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
Date posted:
May 14, 2019
.
Answers (1)
-
Explain three modes of data communication and their practical use.
(Solved)
Explain three modes of data communication and their practical use.
Date posted:
May 14, 2019
.
Answers (1)
-
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
(Solved)
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
Date posted:
May 14, 2019
.
Answers (1)
-
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
(Solved)
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
Date posted:
May 14, 2019
.
Answers (1)
-
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records...
(Solved)
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
Date posted:
May 14, 2019
.
Answers (1)
-
Differentiate between information systems (IS) and information technology (IT).
(Solved)
Differentiate between information systems (IS) and information technology (IT).
Date posted:
May 14, 2019
.
Answers (1)
-
Identify three vital services which information systems can provide to a business organization.
(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted:
May 14, 2019
.
Answers (1)
-
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
(Solved)
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
Date posted:
May 14, 2019
.
Answers (1)
-
Explain four security concerns that personal computer users face in an organization.
(Solved)
Explain four security concerns that personal computer users face in an organization.
Date posted:
May 14, 2019
.
Answers (1)
-
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
(Solved)
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
Date posted:
May 14, 2019
.
Answers (1)
-
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
(Solved)
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
Date posted:
May 14, 2019
.
Answers (1)
-
Discuss the evolution of information systems.
(Solved)
Discuss the evolution of information systems.
Date posted:
May 14, 2019
.
Answers (1)
-
Describe six guidelines for managing computer passwords.
(Solved)
Describe six guidelines for managing computer passwords.
Date posted:
May 14, 2019
.
Answers (1)
-
List seven application packages of a computer system.
(Solved)
List seven application packages of a computer system.
Date posted:
May 14, 2019
.
Answers (1)
-
Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information...
(Solved)
Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information to a business organisation.
Date posted:
May 14, 2019
.
Answers (1)